> On 19 Feb 2016, at 20:54, Ruben Undheim <[email protected]> wrote:
> 
>> 1.) You link against libgnutls-openssl-dev which provides a wrapper for 
>> RAND_bytes.
>> 
>> 2.) We move to GNUtls (or gcrypt?) to call the function that RAND_bytes is 
>> wrapped around (after reading the documentation)
>> 
>> 3.) We use GNU nettle and their yarrow-256 implementation (assuming that is 
>> a smart move)?
> 
> Thanks.
> I did #1. Here's the patch:
> 

I explored 2nd and gnutls calls gcrypt so I looked at gcry_randomize[1]. In 
comparison to the OpenSSL RNAD_bytes documentation I feel a lot is missing. 
RAND_bytes will fail if the RNG is not seeded, I don't see anything like this 
in gcry_randomize documentation. Do I really need to call   gcry_check_version 
or is it okay to not call it?

I will not do this weekend, but please ping me if there is not progress in the 
weeks to come. I think we roughly need to do:


* Call gcry_check_version in the main routine of apps using it
* Switch to use gcry_randomize


holger


[1] 
https://gnupg.org/documentation/manuals/gcrypt/Retrieving-random-numbers.html#Retrieving-random-numbers
[2] https://www.openssl.org/docs/manmaster/crypto/RAND_bytes.html

Reply via email to